PwC Health Industries Viewpoint on Third Party Risk Management



Similar documents
PwC Viewpoint on Third Party Risk Management

Third Party Risk Management 12 April 2012

Risk Management: IT Vendor Management and Outsourcing

Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks.

Managing data security and privacy risk of third-party vendors

White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK. By James Christiansen, VP, Information Risk Management

fs viewpoint

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

Developing and Maintaining a World-Class Third Party Risk Assessment Program

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

THE STATE OF DATA SHARING FOR HEALTHCARE ANALYTICS : CHANGE, CHALLENGES AND CHOICE

Metrics by design A practical approach to measuring internal audit performance

Securing Patient Portals. What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use

White Paper on Financial Institution Vendor Management

Vendor Risk Management in the New Regulatory Environment. kpmg.com

HITRUST CSF Assurance Program

Managing the Shadow Cloud

2014 Vendor Risk Management Benchmark Study

IT Vendor Due Diligence. Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

Emptoris Contract Management Solution for Healthcare Providers

2012 HIPAA Privacy and Security Audits

DATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1

Simplify the Complexity of Managing 3rd Party Anti-Bribery / FCPA Compliance

ROLE OF CONTRACT MANAGEMENT IN A HEALTHCARE COMPLIANCE PROGRAM DESIGN

Healthcare Internal Audit: In a Time of Transition

Dodging Breaches from Dodgy Vendors: Tackling Vendor Risk Management in Healthcare

REGULATORY CHANGES DEMAND AN ENTERPRISE-WIDE APPROACH TO DISCLOSURE MANAGEMENT OF PHI

The Value of Vulnerability Management*

Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January kpmg.com

Identifying and Managing Third Party Data Security Risk

Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape

Third-Party Cybersecurity and Data Loss Prevention

THE UH OH MOMENT. Financial Services Enterprises Focus on Governance, Transparency and Supply Chain Risk

Empower loss prevention with strategic data analytics

EGUIDE BRIDGING THE GAP BETWEEN HEALTHCARE & HIPAA COMPLIANT CLOUD TECHNOLOGY

CORL Dodging Breaches from Dodgy Vendors

Information Security Management System for Microsoft s Cloud Infrastructure

Meeting the HIPAA Training and Business Associate Requirements Questions and Answers, with HIPAA Security Expert Mike Semel

RSA ARCHER OPERATIONAL RISK MANAGEMENT

Agenda. OCR Audits of HIPAA Privacy, Security and Breach Notification, Phase 2. Linda Sanches, MPH Senior Advisor, Health Information Privacy 4/1/2014

CA Technologies Healthcare security solutions:

State of Compliance 2014 Healthcare provider industry brief

Make information work to your advantage. Help reduce operating costs, respond to competitive pressures, and improve collaboration.

From Information Management to Information Governance: The New Paradigm

12/4/2013. Regulatory Updates. Eric M. Wright, CPA, CITP. Schneider Downs & Co., Inc. December 5, 2013

IT Insights. Managing Third Party Technology Risk

Vendor Management Compliance Top 10 Things Regulators Expect

ELECTRONIC HEALTH RECORDS. Nonfederal Efforts to Help Achieve Health Information Interoperability

By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN

What can HITRUST do for me?

Your world runs on applications. Secure them with Veracode.

AML Topics Using analytics to get the most from your transaction monitoring system

2/9/ HIPAA Privacy and Security Audit Readiness. Table of contents

HIPAA and HITRUST - FAQ

Customer Data and Reputational Risk in the Pharmaceutical Industry

HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services

Addressing Risk in Partner / Contractor Selection and Onboarding. Michael Davidson VP Quality Systems and Compliance March 2014

Change is happening: Is your workforce ready? Many power and utilities companies are not, according to a recent PwC survey

FINANCIAL INSTITUTIONS: MANAGING OPERATIONAL RISK WITH RSA ARCHER

what your business needs to do about the new HIPAA rules

HIPAA Omnibus & HITECH Rules: Key Provisions and a Simple Checklist.

Transforming life sciences contract management operations into sustainable profit centers

IDENTIFYING VENDOR RISK THE CRITICAL FIRST STEP IN CREATING AN EFFECTIVE VENDOR RISK MANAGEMENT PROGRAM

Vendor Management: An Enterprise-wide Focus. Susan Orr, CISA CISM CRISC CRP Susan Orr Consulting, Ltd.

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES

Physician Enterprise The Importance of Charge Capture, Business Intelligence and Being a Data Driven Organization

RISK MANAGEMENT PROGRAM THAT WORKS FOUR KEYS TO CREATING A VENDOR. HEADQUARTERS 33 Bradford Street Concord, MA PHONE:

VENDOR MANAGEMENT. General Overview

THE IMPORTANCE OF ENCRYPTION IN THE HEALTHCARE INDUSTRY

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

Third-Party Risk Management for Life Sciences Companies

Dissecting New HIPAA Rules and What Compliance Means For You

Sarbanes-Oxley: Beyond. Using compliance requirements to boost business performance. An RIS White Paper Sponsored by:

FINRA Publishes its 2015 Report on Cybersecurity Practices

Compliance Risk Management Survey A Point of View

Vendor Security Risk Management

Business Associate Management Methodology

WHITE PAPER Third-Party Risk Management Lifecycle Guide

Supply Chain Management Build Connections

Transcription:

www.pwc.com November 2013 PwC Health Industries Viewpoint on Third Party Risk Management Significant others: How companies can effectively manage the risks of third party relationships

Are vendors more trouble than they re worth? For companies, that s a multibillion-dollar question. Data breaches at vendors and other third-parties are costlier than in-house breaches, and the number of incidents is rising. Data breaches resulting from vendors and other third-parties continue to make news: In January 2013, an orthopedic clinic contracted with a third party vendor to transfer old x-ray films into electronic format. The x-ray films, including full names and date of birth of over 17,000 patients, were provided to the vendor, but the clinic never received the electronic version of the films and discovered they were the victims of a scam. The clinic has recommended that the patients remain vigilant by reviewing their account statements and monitoring their credit reports, as they have no way of knowing whether or how patient information may have actually been used.¹ In today's environment, it would be nearly impossible to find a company that doesn't contract with multiple vendors and interact frequently with other third parties. But the convenience and flexibility of engaging third parties comes with significant risks, including the potential for regulatory penalties related to vendor incidents penalties that have soared in recent years, costing companies billions of dollars. Preventing risk events at third-party service providers has always been a challenge, but now the stakes are far higher. Over the past three years, the number of security incidents at companies in the health industries attributed to partners and vendors has risen increasing from 16% in 2010 to 26% in 2012 alone (see Figure 1).² The most recent PwC Global State of Information Security Survey sheds some light on the problem. Although 68% of companies in the health industries respondents expressed confidence that their security activities are effective, only 40% require third-parties to comply with their policies. Over the past 36 months, the number of security incidents attributed to customers, partners, vendors, and other third-parties has escalated. Figure 1: Number of security incidents attributed to vendors³ Partner or vendor ¹ Vendor Scam Results in Data Breach Involving 17k Patients, Healthcare Informatics, March 10, 2013 ² PwC 2013 Global State of Information Security Survey. ³ PwC Analysis based on PwC 2013, 2012, and 2011, Global State of Information Security Surveys. (Not all factors shown. Totals do not add up to 100%.) PwC 2 16% 18% 28% 0% 5% 10% 15% 20% 25% 30% 2010 2011 2012

Customers are voting with their feet. Research shows that companies in the health industries experience higher-thannormal churn (customer turnover) following a security breach. Looking beyond just the significant financial penalties, organizations that suffer security breaches open the door to other serious consequences: The resulting reputational damage can nibble away at an institution s customer base and, eventually, take a bite out of its bottom line Additional consequences can include increased vulnerability to litigation, depressed market value and share price, and the possibility of regulatory enforcement actions When reputations are tarnished after a security event, customers tend to bolt. They don t really care whether the breach originates within the institution itself or within a vendor organization. Financial and reputational damage ensues regardless of the source. As customer attrition grows, revenue shrinks, and the pinch is felt at the bottom line. As shown in Figure 2, Healthcare with it s postbreach churn rate of 4.5 percent is tied with Financial Services for highest turnover rate of the industries surveyed. This indicates that health industry companies are highly vulnerable to customer loss following a security breach. Figure 2: Customer churn following a breach by industry 1 Financial Services Healthcare Pharmaceutical Services Transportation Consumer Industrial Technology Hospitality Media Communications Retail Public 0.3% 1.3% 1.5% 2.0% 2.7% 2.6% 2.5% 2.9% 3.3% 3.8% 4.2% 4.5% 4.5% ¹ Symantec and Ponemon Institute, 2013 Cost of Data Breach Study United States, May 2013 PwC 3

Drivers for Third Party Risk Management Market drivers Substantial reliance on third parties Vendor sourcing decisions that often overlook key risks Incomplete populations of vendors or vendors with sensitive data Inconsistent risk assessment and review practices across organizations Business model necessitates exchange of PHI Complexities in managing third party risk, such as: - Identifying what risks really matter - Selecting which third parties to review - Taking effective action when an issue is found 1996 July 01 Nov 01 May 02 May 07 Aug 03 Oct 13 Mar 13 OCC 2013-29 Third Party Relationships Mar 12 Omnibus HIPAA Rule Jan 11 CFPB Bulletin 2012-03 July 10 PCI-DSS v2.0 Payment Card Mar 10 Industry Data Security Standard Jan 10 Wash. H.B. 1149 (2010 WA Data Security Law) 201 Mass. Code Regs. 17 MA Data Security Law Nov 09 NRS 603A NV Data Security Law GLBA Gramm-Leach Bliley Act Regulatory drivers HITECH Act Health Information Technology for Economic and Clinical Health Act H.F. 1758 MN Plastic Card Security Act California Privacy Bill SB 1386 OCC Bulletin 2002-16 (Foreign-Based Third-Party Service Providers) OCC Bulletin 2001-47 (Oversight and Management of Third-Party Relationships) HIPAA Health Insurance Portability and Accountability Act PwC 4

Following the release of the HIPAA Final Rule in January 2013, a cursory search finds references to Business Associates 1,358 times, evidencing a strong focus on vendor relationships. 1 Companies in the health industries need to monitor their third party relationships for compliance with regulatory requirements, including First Tier, Downstream, and Related Entities (FDR): Payers must have a robust program in place to monitor their FDR relationships Health Insurance Portability and Accountability Act (HIPAA): Companies in the health industries can be held responsible for vendors lack of adherence to HIPAA regulations related to Protected Health Information Health Information Technology Act (HITECH): Among other requirements, HITECH extended the liability of Covered Entities under HIPAA to their Service Providers Food and Drug Administration (FDA): Organizations regulated by the FDA are required to have strong vendor controls in place for a range of sectors including Drugs, Medical Devices, Food, Cosmetics and Tobacco Products Stark Law: Prohibits physician referrals of designated health services for Medicare and Medicaid patients if the physician has a financial relationship with that entity Good x Practice(GxP): A series of quality guidelines and regulations used in sectors such as pharmaceuticals, medical device, cosmetics and food. Manufacturers must establish and maintain procedures to ensure that all products conform to traceability and accountability requirements for all parties that contributed to the development and production of the products 1 http://www.forbes.com/sites/danmunro/2013/05/01/hipaa-support-widens-in-cloud-vendor-community/ PwC 5

Although the industry is making strides to strengthen third party risk management (TPRM), we have observed that most organizations have not yet adopted stratification a leading practice in managing third party risk. Types of data that typically need to be protected: Intellectual Property (IP) Personally Identifiable Information (PII) Payment Card Industry (PCI) Protected Health Information (PHI) Adding to the challenge of effectively managing vendorrelated risk, we see today s companies also struggling with: Implementing formal enterprise-wide TPRM governance (Compliance and Enterprise risk management, etc.) Maintaining an accurate and complete inventory of vendors Incorporating other third-party relationships into their TPRM programs (e.g., business partners, joint ventures, distribution channels, attorneys, utilities, etc.) Establishing standard operational risk methodologies and policies Identifying/using TPRM key risk indicators Implementing and using technology to adequately support the TPRM program, taking some of the burden from the business Staying ahead of, and effectively complying with, changing regulatory requirements Our observations are underscored by the results of PwC s Global State of Information Security Survey 2013: 69% of the surveyed companies lack an accurate inventory of locations or jurisdictions where data is stored 1 74% of companies do not have a complete inventory all third parties that handle personal data of its employees and customers 1 73% of companies lack incident response processes to report and manage breaches to third parties that handle data 1 1 PwC 2013 Global State of Information Security Survey PwC 6

An effective and efficient VRM program can benefit all facets of the enterprise. Here are some of the comments our clients have sh ared with us regarding their TPRM challenges. With careful planning, each can be overcome. We don't have a program to continuously evaluate and re-classify vendors based on assessment results. We have no pre-contract TPRM process in place. I have operational staff focused on VRM and they aren't risk and controls specialists. We have inadequate resources to assess our high risk population on an ongoing basis. We don't centrally manage our TPRM. My vendors have vendors. How do we address the risks associated with those, subcontractor vendors? We were told by our vendor that their SSAE16 is enough. Is that sufficient? PwC 7

Program execution Vendor stratification All too often, companies in the health industries fail to adopt vendor stratification. We observe many organizations applying the same level of risk analysis to all of their vendors, rather than identifying those vendor services deemed to carry the greatest risk and then prioritizing their focus accordingly. The first step in the stratification process is to understand which vendors and services are in scope from an active risk management perspective. Once this subset of vendors has been identified and prioritized, due diligence assessments are performed for the vendors, depending on the level of internal versus vendor-owned controls. The results of these assessments help establish the appropriate monitoring and control requirements that should be maintained for each vendor. This stratification approach focuses resources on the vendor relationships that matter most, limiting unnecessary work for lower-risk relationships. Illustrative risk factors included in a vendor stratification program Vendor stratification prioritizes higher-risk services and vendors Level of due diligence and active risk monitoring Service risks: Volume of financial transactions processed Concentration associated with service Sensitivity risk of the data to which the vendor could potentially have access Compliance and regulatory risks related to the service Customer and financial impact Vendor risks: Location of the vendor (subject to multinational laws, regulations, Safe Harbor, etc.) Previous data or security breaches Extent of outsourcing performed by the vendor Performance history Total third party Inventory! @ #! @ # Remove categories that don t pose risk Stratify third parties into risk categories Prioritize high risk vendors for review Higher risk: on-site reviews Moderate risk: desktop reviews Lower risk: vendor self assessments PwC 8

An effective and efficient VRM program can benefit all facets of the enterprise. A n effective and efficient TPRM program may provide benefits to various facets of the enterprise. Cost Reduced cost of managing third party risk through stratification, process simplification, and use of technology Greater transparency into the costs of third party risk management Quality Higher quality third party risk management throughout the vendor lifecycle Tighter controls over third parties that pose significant risk Consistent approach to assessing third parties and risks they present Standardization Improved quality, efficiency, timeliness and accuracy of TPRM stemming from automated workflows and reporting tools Streamlined and standardized processes for supplier on-boarding, risk profiling, and ongoing monitoring and oversight Greater benefits realized from scorecards and dashboards through use of standardized key performance indicators (KPIs) and key risk indicators (KRIs) Risk More effective monitoring of due diligence activities and their frequency, as now driven by both inherent and residual risks Greater agility in responding to changing regulatory requirements and other TPRM challenges as they arise Flexibility and efficiency Tighter focus on specific controls associated with those relationships found to pose the greatest risk, now made possible through vendor stratification Limited resources now able to be refocused based on identified organizational priorities Enhanced ability to quickly undertake new initiatives when opportunities arise such as launching new services Ability to locate vendor replacements more rapidly as needed Shareholder value Improved compliance with Federal laws and regulations, thereby reducing or eliminating altogether any fines and penalties that could prohibit services and impact the bottom line Less intense scrutiny by the regulatory community Appropriately trained and placed resources PwC 9

PwC offers a range of services with various entry points through the TPRM lifecycle, helping clients assess their current state programs and develop a road map for designing, building, and improving their current programs. Program Diagnostic Perform a high level assessment of the current TPRM function, identifying gaps against needs and leading practices. Assess Transformational Roadmap Execute a comprehensive program review resulting in an end-state blueprint and roadmap to desired state, including anticipated level of effort and costs. Program Management Office Outsource or co-source the TPRM program, including project planning, execution, and reporting. Vendor Assessments Using PwC's global network of firms and service delivery centers, perform the following for specified vendors: on-site or remote reviews or development of selfassessments to be used by vendors. Sustain Vendor Stratification Perform a risk assessment and determine a risk score for all outsourced services and vendors. Help develop the client's strategy to respond to that risk. Transform Function Build/Rebuild Assist in building and implementing a new TPRM office, including the operating model, governance and structure, policies & procedures, processes and controls, and reporting framework. Technology Enablement Integrate processes into new or existing technology platforms. PwC 10

PwC Health Industries Practice PwC s Health Industries Practice serves all segments of the healthcare industry, including providers, payers, entitlements, suppliers, and employers, helping them meet the challenges of today s changing environment. By understanding the needs and issues of each segment, as well as the complex interrelationships of these sectors, we are able to help our clients address issues and take advantage of opportunities. We place a top priority on the continued growth of our healthcare industry practice. We invest heavily to develop the resources and services our clients need to prosper today and meet the challenges of the future. Along with audit, tax, and advisory services, we deliver a wide range of industry-focused services, including governance, risk and compliance, Medicare reimbursement consulting, medical management, actuarial consulting, network development, transaction consulting, and Digital Health. Our professionals include certified public accountants, tax professionals, physicians, nurses, information system professionals, management consultants, health policy analysts, actuaries, financial advisors, and data analysts. The Firm s professionals are recognized industry-wide for their innovation in analyzing, developing and implementing strategic options for clients. PwC s Health Research Institute Through PwC's Health Research Institute, we provide new intelligence, perspective and analysis on trends affecting health-related industries, including healthcare providers, pharmaceuticals, life sciences and payers. PwC was the first of the Big Four firm to invest in a dedicated healthcare research unit. The Institute helps executive decisionmakers and stakeholders navigate chance through a process of research and collaborative exchange that draws on a network of more than 4,000 professionals with day-to-day experience in the health industries. PwC 11

To have a deeper conversation, please contact: Terry Puchley (213) 356-6890 terry.puchley@us.pwc.com TR Kane (216) 875-3038 t.kane@us.pwc.com Rob Stouder (317) 940-7501 rob.stouder@us.pwc.com Tiffany-Anne Gallagher (973) 236-4646 tiffany-anne.gallagher@us.pwc.com Dan Morrison (415) 498-7066 daniel.morrison@us.pwc.com PwC 12

2013 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved. PwC refers to the US member firm, and may sometimes refer to the PwC network. Each member firm is a separate legal entity. Please see www.pwc.com/structure for further details. This content is for general information purposes only, and should not be used as a substitute for consultation with professional advisors.